47,325 research outputs found
Modelling of a Gas Cap Gas Lift System
Imperial Users onl
Recommended from our members
Human-Centered Approaches in Geovisualization Design: Investigating Multiple Methods Through a Long-Term Case Study
Working with three domain specialists we investigate human-centered approaches to geovisualization following an
ISO13407 taxonomy covering context of use, requirements and early stages of design. Our case study, undertaken over three years, draws attention to repeating trends: that generic approaches fail to elicit adequate requirements for geovis application design; that the use of real data is key to understanding needs and possibilities; that trust and knowledge must be built and developed with collaborators. These processes take time but modified human-centred approaches can be effective. A scenario developed through contextual inquiry but supplemented with domain data and graphics is useful to geovis designers. Wireframe, paper and digital prototypes enable successful communication between specialist and geovis domains when incorporating real and interesting data, prompting exploratory behaviour and eliciting previously unconsidered requirements. Paper prototypes are particularly successful at eliciting suggestions, especially for novel visualization. Enabling specialists to explore their data freely with a digital prototype is as effective as using a structured task protocol and is easier to administer. Autoethnography has potential for framing the design process. We conclude that a common understanding of context of use, domain data and visualization possibilities are essential to successful geovis design and develop as this progresses. HC approaches can make a significant contribution here. However, modified approaches, applied with flexibility, are most promising. We advise early, collaborative engagement with data – through simple, transient visual artefacts supported by data sketches and existing designs – before moving to successively more sophisticated data wireframes and data prototypes
Determinants of firm-size
Overzicht van theoretische factoren die belangrijk zijn bij het verklaren van schaalgrootte van bedrijven en verschillen in schaalgrootte tussen vergelijkbare bedrijven. Naast de theoretische factoren worden enkele relevante trends beschreven en wordt gekeken naar de impact van deze trends op de mechanismen die schaalgrootte beïnvloeden. Terwijl het aantal overnames en fusies de laatste jaren sterk is toegenomen, is ook het aantal startende bedrijven sterk gegroeid. Per saldo is het gemiddelde bedrijf in Nederland licht in omvang afgenomen. De mechanismen die schaalgrootte en verdeling van schaalgrootte beïnvloeden, zijn bekeken op het niveau van de bedrijven zelf en op het niveau van sectoren. Bij het bedrijfsniveau gaat het bijvoorbeeld om schaal- en scopevoordelen, transactiekosten, ?agency-costs? en de levenscyclus van bedrijven. Mechanismen die belangrijk zijn op het niveau van sectoren of clusters zijn bijvoorbeeld externe schaal- en scope-effecten en netwerkeffecten. Overigens is er veel overlap tussen al deze mechanismen. Trends die belangrijk zijn voor schaalgrootte zijn met name globalisering, technologische ontwikkeling en deregulering.
Managing Research Data in Big Science
The project which led to this report was funded by JISC in 2010--2011 as part of its 'Managing Research Data' programme, to examine the way in which Big Science data is managed, and produce any recommendations which may be appropriate. Big science data is different: it comes in large volumes, and it is shared and exploited in ways which may differ from other disciplines. This project has explored these differences using as a case-study Gravitational Wave data generated by the LSC, and has produced recommendations intended to be useful variously to JISC, the funding council (STFC) and the LSC community. In Sect. 1 we define what we mean by 'big science', describe the overall data culture there, laying stress on how it necessarily or contingently differs from other disciplines. In Sect. 2 we discuss the benefits of a formal data-preservation strategy, and the cases for open data and for well-preserved data that follow from that. This leads to our recommendations that, in essence, funders should adopt rather light-touch prescriptions regarding data preservation planning: normal data management practice, in the areas under study, corresponds to notably good practice in most other areas, so that the only change we suggest is to make this planning more formal, which makes it more easily auditable, and more amenable to constructive criticism. In Sect. 3 we briefly discuss the LIGO data management plan, and pull together whatever information is available on the estimation of digital preservation costs. The report is informed, throughout, by the OAIS reference model for an open archive
Practice activity trends among oral and maxillofacial surgeons in Australia
© 2004 Brennan et al; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.BACKGROUND: The aim of this study was to describe practice activity trends among oral and maxillofacial surgeons in Australia over time. METHODS: All registered oral and maxillofacial surgeons in Australia were surveyed in 1990 and 2000 using mailed self-complete questionnaires. RESULTS: Data were available from 79 surgeons from 1990 (response rate = 73.8%) and 116 surgeons from 2000 (response rate = 65.1%). The rate of provision of services per visit changed over time with increased rates observed overall (from 1.43 ± 0.05 services per visit in 1990 to 1.66 ± 0.06 services per visit in 2000), reflecting increases in pathology and reconstructive surgery. No change over time was observed in the provision of services per year (4,521 ± 286 services per year in 1990 and 4,503 ± 367 services per year in 2000). Time devoted to work showed no significant change over time (1,682 ± 75 hours per year in 1990 and 1,681 ± 94 hours per year in 2000), while the number of visits per week declined (70 ± 4 visits per week in 1990 to 58 ± 4 visits per week in 2000). CONCLUSIONS: The apparent stability in the volume of services provided per year reflected a counterbalancing of increased services provided per visit and a decrease in the number of visits supplied.David S Brennan, A John Spencer, Kiran A Singh, Dana N Teusner and Alastair N Gos
Managing Research Data: Gravitational Waves
The project which led to this report was funded by JISC in 2010–2011 as part of its
‘Managing Research Data’ programme, to examine the way in which Big Science data
is managed, and produce any recommendations which may be appropriate.
Big science data is different: it comes in large volumes, and it is shared and
exploited in ways which may differ from other disciplines. This project has explored
these differences using as a case-study Gravitational Wave data generated by the LSC,
and has produced recommendations intended to be useful variously to JISC, the funding
council (STFC) and the LSC community.
In Sect. 1 we define what we mean by ‘big science’, describe the overall data
culture there, laying stress on how it necessarily or contingently differs from other
disciplines.
In Sect. 2 we discuss the benefits of a formal data-preservation strategy, and the
cases for open data and for well-preserved data that follow from that. This leads to our
recommendations that, in essence, funders should adopt rather light-touch prescriptions
regarding data preservation planning: normal data management practice, in the areas
under study, corresponds to notably good practice in most other areas, so that the only
change we suggest is to make this planning more formal, which makes it more easily
auditable, and more amenable to constructive criticism.
In Sect. 3 we briefly discuss the LIGO data management plan, and pull together
whatever information is available on the estimation of digital preservation costs.
The report is informed, throughout, by the OAIS reference model for an open
archive. Some of the report’s findings and conclusions were summarised in [1].
See the document history on page 37
Focal Spot, Fall/Winter 1996
https://digitalcommons.wustl.edu/focal_spot_archives/1071/thumbnail.jp
Spam
With the advent of the electronic mail system in the 1970s, a new opportunity for direct marketing using unsolicited electronic mail became apparent. In 1978, Gary Thuerk compiled a list of those on the Arpanet and then sent out a huge mailing publicising Digital Equipment Corporation (DEC—now Compaq) systems. The reaction from the Defense Communications Agency (DCA), who ran Arpanet, was very negative, and it was this negative reaction that ensured that it was a long time before unsolicited e-mail was used again (Templeton, 2003). As long as the U.S. government controlled a major part of the backbone, most forms of commercial activity were forbidden (Hayes, 2003). However, in 1993, the Internet Network Information Center was privatized, and with no central government controls, spam, as it is now called, came into wider use. The term spam was taken from the Monty Python Flying Circus (a UK comedy group) and their comedy skit that featured the ironic spam song sung in praise of spam (luncheon meat)—“spam, spam, spam, lovely spam”—and it came to mean mail that was unsolicited. Conversely, the term ham came to mean e-mail that was wanted. Brad Templeton, a UseNet pioneer and chair of the Electronic Frontier Foundation, has traced the first usage of the term spam back to MUDs (Multi User Dungeons), or real-time multi-person shared environment, and the MUD community. These groups introduced the term spam to the early chat rooms (Internet Relay Chats). The first major UseNet (the world’s largest online conferencing system) spam sent in January 1994 and was a religious posting: “Global alert for all: Jesus is coming soon.” The term spam was more broadly popularised in April 1994, when two lawyers, Canter and Siegel from Arizona, posted a message that advertized their information and legal services for immigrants applying for the U.S. Green Card scheme. The message was posted to every newsgroup on UseNet, and after this incident, the term spam became synonymous with junk or unsolicited e-mail. Spam spread quickly among the UseNet groups who were easy targets for spammers simply because the e-mail addresses of members were widely available (Templeton, 2003)
- …